#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Duqu - Next Major Cyber Weapon like Stuxnet

Duqu - Next Major Cyber Weapon like Stuxnet

Oct 18, 2011
Duqu - Next Major Cyber Weapon like Stuxnet The Stuxnet cyberworm could soon be modified to attack vital industrial facilities in the US and abroad, cybersecurity experts warned Wednesday at a Senate hearing. Computer security companies agree that these virus is unprecedented and it means the dawn of a new world. Stuxnet and Duqu were not designed to steal money or send spam but to sabotage plants and cause damage in industrial environments. Expect the appearance of additional copies. The Stuxnet virus that attacked Iran's nuclear program can cripple the country's nuclear facilities for two years, a German computer expert announced on Wednesday, December 15, 2010. From what researchers can tell, Duqu's mission is to gather intelligence data and assets from entities like industrial control system manufacturers, to more easily conduct a future attack against another third party. According to Symantec, the next threat, dubbed "DuQu" because the code has the code strin...
Famous VPN service Proxpn compromised

Famous VPN service Proxpn compromised

Oct 18, 2011
Famous VPN service Proxpn compromised proXPN is one of the famous VPN client based on OpenVPN Service, today hacked by hacked named " TurkisH-RuleZ ". The Server is seems to be Compromised in this Hacking case. Compromised url is h ttp://proxpn.com/whmcs1/downloads and Mirror of Hack is available here .
Report says : US considered cyber war on Libya

Report says : US considered cyber war on Libya

Oct 18, 2011
Report says : US considered cyber war on Libya Officials in the US Obama administration considered compromising Libya's government computer networks to block early-warning data gathering and missile launches on NATO war planes during the American-led strikes, but decided against it, according to The New York Times. The report goes on to claim that, while the use of what is believed to be a pre-existing armoury of Trojans, viruses, malware and military hackers was suggested, the cyber-attack was never actually carried out. The attack would have tried to disrupt Libya's early-warning radar system and thus cripple the North African country's ability to fire back at attacking NATO aircraft.But the Obama administration and the Pentagon chose instead to mount a conventional attack, partly because an American cyberattack might have set a dangerous precedent, and Libya might not have been worth the risk. In the end, American officials rejected cyberwarfare and used convent...
cyber security

New Whitepaper: The Evolution of Phishing Attacks

websitePush SecurityIdentity Attacks / Phishing
Why is phishing still so effective? Learn about modern phishing techniques and how to counteract them.
cyber security

Key Essentials to Modern SaaS Data Resilience

websiteVeeam SoftwareSaaS Security / Data Protection
Read this guide to learn exactly what today's organizations need to stay protected, compliant, and in control
Jynx Kit (LD_PRELOAD) Userland Rootkit Released

Jynx Kit (LD_PRELOAD) Userland Rootkit Released

Oct 17, 2011
Jynx Kit (LD_PRELOAD) Userland Rootkit Released Jynx Kit is a LD_PRELOAD userland rootkit. Fully undetectable from chkrootkit and rootkithunter. Includes magic packet SSL reverse back connect shell based on SEQ/ACK numbers in a single packet. Solid building block for further LD_PRELOAD rootkits. DOWNLOAD HERE Submitted by ErrProne (www.blackhatacademy.org)
More than 10,000 Facebook account hacked by TeamSwaSTika

More than 10,000 Facebook account hacked by TeamSwaSTika

Oct 17, 2011
More than 10,000 Facebook account hacked by TeamSwaSTika Another group of Hackers, self titled Team Swastika, have caused panic amongst Facebook users after releasing the details of 10,000 accounts onto popular text sharing site, Pastebin. Pastebin, usually used to share source code, has frequently been host to a number of text files that contain the details of specific hacks by hackitivists and hacker groups. Team Swastika is just one of these hackitivist groups but claims to be the most powerful hacking team in Nepal. They also said that next target will be Nepal Government website. Facebook hacked account dump: https://pastebin.com/KYsd0j5B (part1) - Removed by Pastebin https://pastebin.com/nN5uDrQS (part2) - Removed by Pastebin
National Cyber Security Bulletin on Anonymous

National Cyber Security Bulletin on Anonymous

Oct 17, 2011
National Cyber Security Bulletin on Anonymous DHS has analyzed the likelihood of Anonymous attacking industrial control systems (ICS) after the hacktivist group showed such intentions earlier this year. " Assessment of Anonymous Threat to Control Systems " that was drafted by the National Cybersecurity and Communications Integration Center (NCCIC) back in September. The document is not classified, but it is intended for official use only. The report describes an interest within Anonymous to target industrial control systems. " The capability of the individual to recognize and post code that would gain the attention of those knowledgeable in control systems, as well as their claims to have access to multiple control systems, indicates the individual has an increased interest in control systems, but does not demonstrate capabilities ," the NCCIC said in its report. Download Complete Bulletin
'Good to Know' campaign : Google Collaborates with Citizens Advice Bureau for Online Safety

'Good to Know' campaign : Google Collaborates with Citizens Advice Bureau for Online Safety

Oct 17, 2011
'Good to Know' campaign : Google Collaborates with Citizens Advice Bureau for Online Safety Google's first ever advertising campaign for online safety launches today, in association with the Citizens Advice Bureau. It covers topics such as choosing a password, scam emails and using two factor authentication.The company said future campaigns may deal more extensively with how Google uses people's personal data. The two organisations by using various means and methods, like using adverts in newspapers, on public transports and online, will try to encourage users to adopt secure passwords, log out of web browsers and computers after using them and also to adopt more complex ways to sign in their email accounts which is known as "two-factor authentication".The campaign also focuses on child protection and use of 'cookies' in web browsers. This is the first campaign by Google, which is promoting something different than products such as web browser Chrome. The campaign is p...
Expert Insights Articles Videos
Cybersecurity Resources
//]]>